SEARCH KEYWORD -- Access token
Weibo is testing an Instagram like app called Lvzhou
Weibo, the Chinese version of Twitter, is testing an Instagram like app called Lvzhou(Oasis in English). Now only invited people can access the app. You can download the app on App Store if you are an iPhone user or you can download online if you are an Android user. The vision of this app is to allow users to discover beautiful world, users can post photos or short videos and share with the rest of the world. Before you can access the app, you have to obtain an invitation code shared by y...
Install LAMP in two easy steps
You might have seen my earlier post related to installing PHP, Apache and MySQL on UBUNTU 11.10. That process contains number of steps and some lengthy commands which we can not remember easily. After good comments from Gaurav and Coward I have managed to get that lengthy process in just 2 steps. So I thought its great to share with all readers to they can get benefit as...
The price of information
SOMETIMES it takes but a single pebble to start an avalanche. On January 21st Timothy Gowers, a mathematician at Cambridge University, wrote a blog post outlining the reasons for his longstanding boycott of research journals published by Elsevier. This firm, which is based in the Netherlands, owns more than 2,000 journals, including such top-ranking titles as Cell and the Lancet. However Dr Gowers, who won the Fields medal, mathematics’s equivalent of a Nobel prize, in 1998,...
Information,Price,Value,Facebook,Social network 2012-02-07 06:24:53
Java SynchronizedList and Iterator
While reading some material about concurrency, I come up with some writing about using SynchronizedList wrap about normal List to enable synchronization. But one interesting thing is http://docs.oracle.com/javase/7/docs/api/java/util/Collections.html#synchronizedList%28java.util.List%29 It says It is imperative that the user manually synchronize on the returned list when iterating over it: 1 List list = Collections.synchronizedList(new A...
A new SSL 3.0 vulnerability named POODLE is released
Today a new SSL v3 security vulnerability is released by Google and it affects all products which is using SSL v3 protocol as this vulnerability is introduced by a design flaw. Google revealed details of the design flaw on Tuesday, and dubbed it POODLE – short for Padding Oracle On Downgraded Legacy Encryption. It is a blunder within the blueprints of SSL 3.0 rather than a software bug, so it affects any product following the protocol – from Google Chrome and Mozilla Firefox to Micro...
SSL v3, vulnerability, Google, POODLE 2014-10-15 04:48:59
Three ways to define class in JavaScript
In object oriented programming, class is the template of object, it defines the properties and methods of a group of objects. Unfortunately, JavaScript doesn't support class, but we can have some workarounds to simulate class.1. Constructor functionThis is the classical approach, it is also the approach mentioned in many text books. It uses the constructor function to simulate class and it uses the keyword this to represent the object internally.function Cat() {  this.name = "Kelly...
JavaScript,Class,Method,Private,Inheritance 2012-07-09 11:59:51
Understanding JavaScript closure and where it can be used
Closure The official definition of closure is: an expression (usually a function) that has many variables and is bound to an environment that includes those variables. In JavaScript, closure refers to the ability of a function to access the lexical scope in which it was defined, even after the function has been executed and left that scope. This ability is due to the fact that when a function is created, it generates a closure that includes a reference to the definition environment of the curr...
CLOSURE,JAVASCRIPT,USAGE 2023-03-05 02:17:08
Differences among Enter,F5 and Ctrl+F5 in webpage refresh
When we press Enter, F5 or Ctrl+F5 to refresh a webpage, is there any difference among them? Actually it's yes, we can find the difference from the request header and response header information. There are two cases about pressing Enter in the address bar. First if the page requested is cached and not expired in the browser, we can find the header information sent by the browser is : Host 192.168.3.174:8080 User-Agent Mozilla/5.0 (Windows NT 5.1; rv:5.0) Gecko/20100101 Firefox/5.0 Accept ...
Identify & Address 3 Common BYOD Adoption Problems
With an abundance of mobile phones, tablets, and other personal devices; delivering Enterprise Mobility Solutions has become much more easier as compared to early years, however; the new avenues that have opened up for Enterprise Mobility Consulting in India brings in new, interesting and unforeseen challenges as well. Alongside the growing presence of SaaS applications and BYOD; data protection and integrity has become very critical and a concern that demands immediate attention. Here are some ...
enterprise mobility solutions, enterprise mobility consulting, enterprise mobility management servic 2015-03-16 06:05:21
The Windows 8.1 Update is here! What to Expect from it?
Windows has finally released the update for Windows phone, the Windows 8.1! Microsoft has finally released the version upgrade which has interesting enhancements. This may not seem like a major upgrade but it definitely looks interesting. This latest update has been released on the Lumia phones that were running using the 8.0 version. There is a lot to look forward to in this new update, and some of it will definitely feel interesting. Folders along Live Tiles For a long time, people were attrac...
windows 8.1 2014-08-21 08:34:24
RECENT
- EtsiosApp Release Date: All You Need to Know
- SIEM Big Data Visualization [03]:Graph-Based SIEM Log Analysis Dashboard
- How AI is Changing Web Development: A New Era of Digital Innovation
- SIEM Big Data Visualization [02]: National Cyber Threats Dashboard
- Exploring the Impact of a Loan Origination System on Financial Institutions
- Power Grid OT Simulation System
- Why is Golang's Compilation Speed So Fast?
- SIEM Big Data Visualization : Dashboard for Monitoring Scam Events in Critical Infrastructure
- Introduction to the Application of eBPF in Golang
- Flows.network: Writing an LLM Application in Rust
- more>>